NEW Research: The Attacker-Defender Divide  
Download now >
Contact Us
Talk to an Expert
Request a demo

Kenna Blog

Thoughtful perspectives on Modern Vulnerability Management.

Responsible Exposure and What It Means for the Industry

To prove that a vulnerability exists and is exploitable, the researchers may develop exploit code. Every once in a while that code becomes public before a patch for that vulnerability is released.
Read More
Podcast

re:Invent’ing 2020

Jerry Gamblin gives us a pre-thanksgiving primer for Amazon AWS re:Invent 2020, which will be held from Nov. 30 – Dec 18th on a computer monitor near you. \

READ MORE
Industry

AWS re:Invent 2020 Guide

This time last year, I was thinking about enjoying a week off for Thanksgiving and then making my yearly pilgrimage to Las Vegas for a week of product launches, parties, and promises of cloud security perfection. COVID-19 had just started to make some early news, and I was only worried about getting sick in Vegas…

READ MORE
Customer

5 CX Tips for Achieving a Self-Service Environment

Among cybersecurity solution providers, the notion of a self-service environment has long been a kind of Holy Grail, shimmering gloriously in the distance but too often proving elusive. One reason is that medium to large enterprises, with their vast scale and unique requirements, expect and deserve more hands-on, bespoke attention. Another is that achieving a…

READ MORE
Podcast

The Attacker-Defender Divide with Cyentia Institute

We discuss the sixth and latest report in our ongoing dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 6: The Attacker-Defender Divide looks at exploitation events from 2019 to analyze the momentum shifts between cybersecurity hackers and the teams defending organizations from attack.

READ MORE
Research

Responsible Exposure and What It Means for the Industry

There’s a debate that crops up continously in security circles over the role of security researchers that hunt for vulnerabilities.  On the one hand, this group of professionals perform a vital service. They find vulnerabilities in systems before bad guys do.  To prove that a vulnerability exists and is exploitable, the researchers may develop exploit…

READ MORE
Podcast

The Death Of Containers As We Know Them?

Will Docker’s download rate limits kill containers as we know them today?

READ MORE

5 Things Every CIO Should Know About VM

Read this eBook to learn what a modern vulnerability management approach means to your IT operation. You discover how it helps CIOs like you create more efficient and effective teams while reducing your company’s overall risk profile.

Download Now
Product

Kenna.VI: Handling Red Alerts at Warp Speed

If you’ve worked in operational security handling vulnerability management, I’m sure you’ve found yourself in this situation. You’ve also seen it played out time and time again if you’ve worked for a company that sells a VM scanner. You’re sitting in the Captain’s chair and the red lights start flashing. The next big “named” vulnerability…

READ MORE
Risk-Based Vulnerability Management

Analysts Agree: Risk-Based Vulnerability Management a Priority for 2021

Taking a risk-based approach to vulnerability management has always been our priority, and lately the industry has followed suit. Now in a new blog listing Gartner’s Top 10 Security Projects for 2020-2021, it’s clear that Gartner thinks it should be a priority for you, too. For a sense of why RBVM is a top priority…

READ MORE
Podcast

Managing 3rd Party Code Risk

We discuss the challenges managing risk in 3rd party code from things like Open Source Software libraries. Transcript of the pod DAN Today on Security Science, managing third party code risk. Hello, and thanks for joining us today as we discuss the surprisingly, well, at least to me, challenges with managing risk in software code…

READ MORE
Customer

For a Superior Cybersecurity Customer Experience, Define Success —Then Measure It

I’ve worked in the customer experience (CX) field my entire career (whether I knew it or not). In that time I’ve seen and employed plenty of approaches that work—and nearly just as many that don’t. In the months to come, I want to share some of what I’ve learned with other CX professionals in the…

READ MORE
Research

The NSA ❤️ Risk-Based Vulnerability Management

Growing up I loved the Spy vs. Spy comic in MAD Magazine where one spy always tried to get an advantage over the other. One tactic neither spy used, though, was publishing a list of the attacks the other spy was likely to try, which is why I was both bemused and amused when the…

READ MORE
Podcast

Measuring What Matters with Cyentia Institute

We discuss the fourth report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 4: Measuring What Matters In Remediation.

READ MORE
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.